The invention is regarding to the field of mobile edge computing, in particular to an edge computing method and the security protection in the Internet of Things
In order to meet various applications with low delay requirements, such as industrial control, unmanned driving, virtual reality, etc. The new network architecture has emerged as edge computing. Edge computing devices are introduced between the cloud computing servers and terminals. Compared with cloud computing, edge computing brings nearby data processing, reduces network transmission and delay, and thus improves security. It is called “the last kilometer of artificial intelligence”. In the meantime, the security of edge computing system becomes the key issue to the applications. In the future, a large number of heterogeneous terminals will access to the edge computing servers, and it has different application requirements. With the computing resource support at the edge, it can adopt a variety of secure access policies to support the secure access of heterogeneous terminal and data security access. Therefore, this patent proposed a method to quantify the security risks and threats for the terminal and data, which selects the appropriate algorithm, and based on the objective quantitative standards to choose the terminal security access strategy to achieve maximum optimization of system security performance at the edge computing system.
The present invention is to solve technical problems, which are described below Quantifying the security risks and threats for the terminal and data, based on the security risk, system complexity, and quantifying terminal and data security risks and threats, and selecting the appropriate algorithm to choose the terminal security access strategies based on the objective quantitative standards, which achieves maximum optimization of system security at the edge computing system.
The technical solution adopted by the invention to solve the above technical problems is to make full use of the computing ability of the edge computing devices, and select the security access strategies of edge computing side by adopting AHP (Analytic Hierarchy Process) and machine learning algorithm to realize the maximum optimization of the security performance of edge computing system.
A quantitative selection method of security access strategies for edge computing side, which includes the following steps:
1) According to the security risks and application requirements of terminal and data application under the edge computing system, the security risks are quantified as:
For every possible attack on the terminals, (for example: permission attack, data storage and encryption attack, loophole threat and remote control, etc.), the security risks of terminals and data are quantified from three aspects as the system risk, destructive force, and vulnerability, respectively. As is shown in
Where t=1, 2, 3, v=1, 2, . . . s, and atv is the quantification value of the security risk of a terminal under an attack, which is referred to Table 1.
2) The quantification value of the i-th security risk Wi on the k-th terminal is:
3) There are p security strategies on the edge side, the evaluation matrix is:
4) The security protection quantification value after applying the p security strategies to the i-th terminal or data is:
Z
i
=W
i
·B={Z
1
i
Z
2
i
. . . Z
j
i
. . . Z
p
i},(i=1,2, . . . k;j=1,2, . . . p) (4)
Where Zji is a quantification value of security protection after applying the j-th security strategy to the i-th terminal or data;
5) If only a single security strategy is required, it is selected based on the maximum value of Zji, (i=1, 2, . . . k; j=1, 2, . . . p); when a combination of two or more security strategies are required, the machine learning method and a deep learning algorithm are used to select the strategies based on the quantification value in (4).
The benefits of the invention are described below:
(1) The method realizes the optimization of the security performance of the edge computing system by selecting the security access strategy of the edge computing terminal through the objective quantified standard.
(2) Through the quantitative relationship between the security strategies and the risks of terminal or data application, the method gives the comprehensive assessment by considering both security and complexity, so as to obtain the most economical security strategies under the security requirements.
The following content gives more detailed description of the technical details of the invention in combination with the method of BP neural network, but the protection scope of the invention is not limited to the following description.
According to the security risks and application requirements of terminal and data application under the edge computing system, the security risks are quantified as:
For every possible attack on the terminals, (for example: permission attack, data storage and encryption attack, loophole threat and remote control, etc.), the security risks of terminals and data are quantified from three aspects as the system risk, destructive force, and vulnerability, respectively. As is shown in
S1. When there are s kinds of threats, the evaluation matrix is written as:
Where t=1, 2, 3, v=1, 2, . . . s, and atv is the quantification value of the security risk of a terminal under an attack, which is referred to Table 1.
S2. The quantification value of the i-th security risk Wi on the k-th terminal is:
S3. There are p security strategies on the edge side, the evaluation matrix is:
S4. The security protection quantification value after applying the p security strategies to the i-th terminal or data is:
Z
i
=W
i
·B={Z
1
i
Z
2
i
. . . Z
j
i
. . . Z
p
i},(i=1,2, . . . k;j=1,2, . . . p) (4)
Where Zji is a quantification value of security protection after applying the j-th security strategy to the i-th terminal or data;
S5. If only a single security strategy is required, it is selected based on the maximum value of Zji, (i=1, 2, . . . k; j=1, 2, . . . p); when a combination of two or more security strategies are required, the machine learning method and a deep learning algorithm are used to select the strategies based on the quantification value in (4).
S5.1: k terminals (k=m+n) have p security strategies, and each security strategy is expressed as yji (i=1, 2, . . . k; j=1, 2, . . . p). Then, the security quantification value in formula (4) and the security strategy yji are combined into a data set D={(Z1, y1), (Z2, y2), . . . , (Zk, yk)}.
S5.2 Divide the data set D, and take the first m items of data set D as the training set T, and the next n items as the test set S, where k=m+n. That means, the training set T={(Z1, y1), Z2, y2), . . . , (Zm, ym)}, the proportion of the data set is
the test set CHE={(Zm+1, ym+1), (Zm+2, ym+2), . . . , (Zm+n, ym+m)}, the proportion of the data set is
S5.3 Determine the BP neural network structure. The BP neural network includes the number of hidden layers, and the number of nodes in each hidden layer, which is shown in
S5.4 Use the training set T={(Z1, y1), (Z2, y2), . . . , (Zm, ym)} to train the BP neural network. The training is shown in
S5.5 After training input the test set CHE={(Zm+1, ym+1), (Zm+2, ym+2), . . . , (Zm+m, ym+n)} into the BP neural network to obtain the corresponding security strategies.
Number | Date | Country | Kind |
---|---|---|---|
201910622251.6 | Jul 2019 | CN | national |
This application is the national stage entry of International Application No. PCT/CN2019/129463, filed on Dec. 27, 2019, which is based upon and claims priority to Chinese Patent Application No. 201910622251.6 filed on Jul. 11, 2019, the entire contents of which are incorporated herein by reference.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2019/129463 | 12/27/2019 | WO | 00 |